What is the value of the symmetric key

Assignment Help Computer Network Security
Reference no: EM13336732

List some of the attacks on the Diffie-Hellman key exchange protocol we discussed in the lecture. Present your solution for avoiding such attacks.

a) In the Diffie-Helman protocol, g=11, p=29, x=5, and y=7.

What is the value of the symmetric key?

What is the value of R1 and R2?

Variations of data
g=7, p=23, x=3, and y=5
g=5, p=19, x=7, and y=3
g=11, p=31, x=3, and y=9
g=7, p=43, x=2, and y=7

b) In the Diffie-Helman protocol, what happens is x and y have the same value, that is, Alice and Bob accidentally chosen the same number? Are R1 and R2 same? Do the session key calculated by Alice and Bob have the same value? Explain what would adversary observe? Could she guess Alice's and Bob's private key? Use an example to prove your claims.

Using RSA scheme, let p=23, q=31, d=457, calculate the public key e. Provide detailed description of all steps, explain what information will be published and what destroyed.

Optionally: Encrypt and decrypt simple message M1=100.

Variation of data
p=23, q=31, d=233
p=23, q=31, d=139

b) Suppose Fred sees your RSA signature on m1 and m2, (i.e., he sees (m1d mod n) and (m2d mod n)). How does he compute the signature on each of m1j mod n (for positive integer j), m1-1 mod n, m1 x m2 mod n, and in general m1j m2k mod n (for arbitrary j and k)?

Reference no: EM13336732

Questions Cloud

How the brominated products are prepare : Predict the products likely to be formed via the anti- addition of Br2/acetic acid to trans- cinnamic acid. • What is the predicted m.p. of the brominated product(s) you prepare via this method
Determine the speeders speed with respect to the ground : A speeder is pulling directly away and increasing his distance from a police car that is moving at 26 m/s with respect to the ground. Find the speeder's speed with respect to the ground
By roughly how much has the temperature of iron increased : A 22 kg block of iron drops out of the back of a pickup truck traveling at 55 mi/h. By roughly how much has the temperature of the iron increased
Journal entries to record the requisition slips : Prepare summary journal entries to record (i) the requisition slips, (ii) the time tickets, (iii) the assignment of manufacturing overhead to jobs, and (iv) the completion of Job No. 429.
What is the value of the symmetric key : In the Diffie-Helman protocol, what happens is x and y have the same value, that is, Alice and Bob accidentally chosen the same number? Are R1 and R2 same?
Find the speed and direction of the resulting blob of clay : a 40g clay ball going southeast at a 45 degree angle at 4m/s collides with a 30g clay ball moving to the west at 3.0 m/s. find the speed and direction of the resulting blob of clay
Prepare the entry to assign factory labor to production : Prepare the entry to assign factory labor to production and prepare the entry to record the factory labor costs for the month of January.
Explain the ph of the solution in the cathode compartment : What is the pH of the solution in the cathode compartment of the following cell if the measured cell potential at 25 degrees C is 0.51V
How far does the block travel before coming to rest : A 2 kg block is connected into a spring attached to a wall with spring constant of 12 N/m. How far does the block travel before coming to rest

Reviews

Write a Review

Computer Network Security Questions & Answers

  Turtle shell architecture

Turtle Shell Architecture, zero-byte representation, Access Control List, DNS Cache Poisoning attack, 16-pass iterative and 9-pass recursive PHP function

  Illustrate that signature verification will succeed

If Bob receives M and S, describe process Bob will use to verify signature. Illustrate that in this case signature verification will succeed.

  Dos and ddos attack

Denial of Service attack (DoS) and Distributed Denial of service (DDoS) attack, two-factor authentication system, password ageing, biometric devic,  cryptographic attack made Double DES (2DES), Demilitarized Zone (DMZ), SSL protocols

  Describe network crimes related to dns entry alteration

Describe network crimes that are related to DNS entry alteration or bogus DNS servers. In a network investigation, some network administrators may be cooperative while others may not.

  Question about systems analysis

The owners of a store are looking for a lighted sign that could be mounted outside the store. The lights in the sign should be turned on when the outdoor light level falls given below a level defined through the owners.

  Ip spoofing

honeypot or a firewall, error handling, Denial-Of-Service, Public Key Infrastructure, WLAN Administrator, WEP Protocol, RSA Algorithm, Network Engineer

  What is expected number of bits raw keys agree

phase 1 communication between Alice and Bob. Suppose the raw keys consist of k bits each. What is the expected number of bits on which Alice's and Bob's raw keys agree? Explain your answer.

  Calculate an rsa signature on a long message

Would it be reasonable to compute an RSA signature on a long message by ?rst computing what the message equals mod n, for some ?xed n and then signing this computed value only. Why or why not?

  Classify this vulnerability using the risos model

The time-to-expire field is set at 0.5 because the administrator believes that this field unit is minutes (and wishes to set the time to 30 seconds) However, bind expects the field to be in seconds and reads the value as 0 - meaning that no data i..

  Cryptosystem

Block cipher, Primitive root, Confusion, Diffusion, Digital signature, Conventional Symmetric-Key Encryption

  Security vulnerabilities of vc

single access point (AP), wireless network, CSMA/CA, goals of information security, Wireless LANs, wireless hacking process, Wired Equivalent Privacy (WEP), Open System Authentication and Shared Key Authentication, Initialisation Vector (IV), RADIU..

  Calculate m mod p in rsa cryptosystem

Assume that instead of using composite N = pq in RSA cryptosystem, we simply use prime modulus p. Calculate m mod p. Justify correctness and analyze running time of decryption algorithm.

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd